메뉴 건너뛰기




Volumn 12, Issue 3, 2011, Pages 137-150

Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points

Author keywords

Additive cipher; Affine cipher; Cyclic elliptic curve; Image encryption; Stream cipher system

Indexed keywords

AFFINE CIPHER; DISTINCT POINTS; ELLIPTIC CURVE; ENCRYPTION ALGORITHMS; FINITE FIELDS; IMAGE ENCRYPTION; IMAGE ENCRYPTION SCHEME; IMAGE ENCRYPTIONS; INTEGER-N; LINEAR FEEDBACK SHIFT REGISTERS; MAXIMAL LENGTH SEQUENCES; MEDICAL IMAGES; NON-BINARY; POINT AT INFINITY; RANDOM SEQUENCE; STREAM CIPHER SYSTEMS; SYMMETRIC KEYS;

EID: 79957816695     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (35)

References (35)
  • 3
    • 31344462815 scopus 로고    scopus 로고
    • Block ciphers and stream ciphers: The state of the art
    • Belgium
    • A. Biryukov, "Block ciphers and stream ciphers: The state of the art", Technical report, Belgium, 2006. (http://www.esat.kuleuven.ac.be)
    • (2006) Technical report
    • Biryukov, A.1
  • 4
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric encryption scheme based on 3D chaotic cat maps
    • G. Chen, Y. Mao, and C. K. Chui, "A symmetric encryption scheme based on 3D chaotic cat maps", Chaos, Solutions & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
    • (2004) Chaos Solutions & Fractals , vol.21 , Issue.3 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Chui, C.K.3
  • 6
    • 34247623219 scopus 로고    scopus 로고
    • An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption
    • H. El-din, H. Ahmed, H. M. Kalash, and O. S. F. Allah, "An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption"', Informatica, vol. 31, pp. 121-129, 2007.
    • (2007) Informatica , vol.31 , pp. 121-129
    • El-din, H.1    Ahmed, H.2    Kalash, H.M.3    Allah, O.S.F.4
  • 7
    • 84874800178 scopus 로고
    • "A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information theory, vol. IT-31, pp. 469-472, 1985.
    • (1985) IEEE Transactions on Information theory , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 8
    • 0003508558 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publications (FIPS 197)Nov
    • Federal Information Processing Standards Publications (FIPS 197), Advanced Encryption Standard (AES), Nov. 2001.
    • (2001) Advanced Encryption Standard (AES)
  • 10
    • 84968480565 scopus 로고
    • Primitive polynomials over finite fields
    • Oct
    • T. Hansen, G. L. Mullen, "Primitive polynomials over finite fields", Mathematics of Computation, vol. 59, no. 200, pp. 639-643, Oct. 1992.
    • (1992) Mathematics of Computation , vol.59 , Issue.200 , pp. 639-643
    • Hansen, T.1    Mullen, G.L.2
  • 11
    • 79953894678 scopus 로고    scopus 로고
    • A digital image encryption algorithm based a composition of two chaotic logistic maps
    • July
    • I. A. Ismail, M. Amin, and H. Diab,"A digital image encryption algorithm based a composition of two chaotic logistic maps", International Journal of Network Security, vol. 11, no. 1, pp. 1-10, July 2010.
    • (2010) International Journal of Network Security , vol.11 , Issue.1 , pp. 1-10
    • Ismail, I.A.1    Amin, M.2    Diab, H.3
  • 13
    • 1242329960 scopus 로고    scopus 로고
    • A random number generator based elliptic curve operations
    • L. P. Lee, K. W. Wong, "A random number generator based elliptic curve operations", Computers and Mathematics with Applications, vol. 47, pp. 217-226, 2004.
    • (2004) Computers and Mathematics with Applications , vol.47 , pp. 217-226
    • Lee, L.P.1    Wong, K.W.2
  • 16
    • 10444257964 scopus 로고    scopus 로고
    • A novel fast image encryption scheme based on 3D chaotic baker maps
    • Y. Mao, G. Chen and S. Lian, "A novel fast image encryption scheme based on 3D chaotic baker maps", International Journal of Bifurcation and Chaos, vol. 14, no. 10, pp. 3613-3624, 2004.
    • (2004) International Journal of Bifurcation and Chaos , vol.14 , Issue.10 , pp. 3613-3624
    • Mao, Y.1    Chen, G.2    Lian, S.3
  • 18
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • LNCS Springer Verlag
    • V. Miller, "Uses of elliptic curves in cryptography", Advances in Cryptology (Crypto'85), LNCS 218, Springer Verlag, pp. 417-426, 1986.
    • (1986) Advances in Cryptology (Crypto'85) , vol.218 , pp. 417-426
    • Miller, V.1
  • 20
    • 34748887111 scopus 로고    scopus 로고
    • A new image encryption approach using combinational permutation techniques
    • A. Mitra, Y. V. S. Rao, and S. R. M. Prasanna, "A new image encryption approach using combinational permutation techniques", International Journal of Computer Science, vol. 1, no. 1, pp. 127-131, 2006.
    • (2006) International Journal of Computer Science , vol.1 , Issue.1 , pp. 127-131
    • Mitra, A.1    Rao, Y.V.S.2    Prasanna, S.R.M.3
  • 26
    • 3843081053 scopus 로고    scopus 로고
    • A statistical test suite for random and pseudorandom number generators for cryptographic applications
    • May 15
    • A. Rukhin et al., "A statistical test suite for random and pseudorandom number generators for cryptographic applications", NIST Special Publication, 800-22, May 15, 2001.
    • (2001) NIST Special Publication , pp. 800-822
    • Rukhin, A.1
  • 27
    • 51249102657 scopus 로고    scopus 로고
    • Image encryption algorithm based on chaotic mapping
    • M. Salleh, S. Ibrahim, and I. F. Isnin, "Image encryption algorithm based on chaotic mapping", Journal Teknologi, vol. 39(D), pp. 1-12, 2003.
    • (2003) Journal Teknologi , vol.39 , Issue.D , pp. 1-12
    • Salleh, M.1    Ibrahim, S.2    Isnin, I.F.3
  • 28
    • 80054704544 scopus 로고    scopus 로고
    • Key sequences of elliptic curve points over finite fields, their properties and application in image encryption and decryption
    • Manipal University
    • S. V. Sathyanarayana, "Key sequences of elliptic curve points over finite fields, their properties and application in image encryption and decryption", Ph.D Thesis, Manipal University, 2010.
    • (2010) Ph.D Thesis
    • Sathyanarayana, S.V.1
  • 34
    • 77950342061 scopus 로고    scopus 로고
    • Software implementations of elliptic curve cryptography
    • July
    • Z. J. Shi and H. Yan, "Software implementations of elliptic curve cryptography", International Journal of Network Security, vol. 7, no. 1, pp. 141-150, July 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 141-150
    • Shi, Z.J.1    Yan, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.